1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
3. Activation detection in fMRI data via multi-scale singularity detection Mekle, Ralf; Laine, Andrew F.; Perera, Gerard M.; Delapaz, Robert L. 2000 Articles MedicineBiomedical engineering
4. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
5. Advocacy Be Not Forsaken! Retrospective Lessons from Welfare Reform Lens, Vicki A.; Gibelman, Margaret 2000 Articles Social serviceSocial advocacyPublic welfare--Moral and ethical aspectsAid to families with dependent children programsTemporary Assistance for Needy Families (Program)
6. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
8. Airborne Test of Laser Pump-And-Probe Technique for Assessment of Phytoplankton Photochemical Characteristics Chekalyuk, Alexander M.; Hoge, Frank E.; Wright, Charles W.; Swift, Robert N. 2000 Articles Biochemistry
9. Alkenones as paleoceanographic proxies Sachs, Julian P.; Schneider, Ralph R.; Eglinton, Timothy I.; Freeman, Katherine H.; Ganssen, Gerald; McManus, Jerry F.; Oppo, Delia W. 2000 Articles Biochemical markersChemical oceanographyPaleoceanographyEnvironmental sciencesPaleoclimatology
10. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science